Jehuty4949 / NSL_KDDView external linksLinks
NSL-KDD Dataset
☆201Jul 30, 2015Updated 10 years ago
Alternatives and similar repositories for NSL_KDD
Users that are interested in NSL_KDD are comparing it to the libraries listed below
Sorting:
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆762May 8, 2019Updated 6 years ago
- Network Security Analysis using Machine Learning on the NSL-KDD dataset from the KDD Cup 1999☆21Nov 3, 2019Updated 6 years ago
- Machine Learning with the NSL-KDD dataset for Network Intrusion Detection☆272Apr 5, 2020Updated 5 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆26May 8, 2020Updated 5 years ago
- Unofficial repo of the research paper ”An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units“. Developed u…☆31Dec 26, 2019Updated 6 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆23Jan 9, 2017Updated 9 years ago
- Network data classifier based on the recurrent neural network.☆20Apr 3, 2019Updated 6 years ago
- Machine Learning Algorithms on NSL-KDD dataset☆97May 30, 2019Updated 6 years ago
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆10Oct 1, 2019Updated 6 years ago
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆293Dec 22, 2023Updated 2 years ago
- [Finished] My Bachelor thesis for the Bachelor Computer Science (2015-2016) at UHasselt: An Intrusion detection system using machine lear…☆41Sep 4, 2016Updated 9 years ago
- Using NSL_KDD data☆28Mar 3, 2019Updated 6 years ago
- ☆14May 30, 2018Updated 7 years ago
- Home router IDS solution with a Raspberry Pi 3. Dynamically resolves device name, manufacturer, and alerts user of Snort analytics throug…☆14Apr 4, 2019Updated 6 years ago
- Short Course - Applied Machine Learning for Security Informatics☆57Aug 26, 2016Updated 9 years ago
- Generative Adversarial Network to generate malware to evade detection☆15Mar 25, 2023Updated 2 years ago
- Replication of Jay Sinha's Efficient Deep CNN-BiLSTM model for network intrusion detection using NSL-KDD and UNSW-NB15 datasets to unders…☆17Aug 25, 2024Updated last year
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- ☆21May 19, 2016Updated 9 years ago
- An Intelligent Intrusion Detection System for IoT networks using Gated Recurrent Neural Networks (GRU) : A Deep Learning Approach☆33Jul 16, 2018Updated 7 years ago
- IDS based on Machine Learning technical☆20Nov 12, 2018Updated 7 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is an Ethernet traffic Bi-flow generator and analyzer for anomaly detection that has …☆675Dec 4, 2023Updated 2 years ago
- Sharkticon is an anomaly detection system, it analyzes your network using a Transformers model adapted to the anomaly detection.☆23May 19, 2023Updated 2 years ago
- ☆70Feb 10, 2023Updated 3 years ago
- things to assist in packet analysis☆27Sep 5, 2023Updated 2 years ago
- This repository is a proof of concept of algorithms described in T-DFNN: An Incremental Learning Algorithm for Intrusion Detection System…☆17Aug 27, 2022Updated 3 years ago
- Curated list of tools and resources related to the use of machine learning for cyber security☆1,517Oct 1, 2020Updated 5 years ago
- Intrusion detection system with Apache Spark and deep learning☆18Mar 14, 2019Updated 6 years ago
- CTI database generator and public dataset☆21Jan 12, 2020Updated 6 years ago
- ☆21Sep 21, 2020Updated 5 years ago
- 本笔记是对课程CS 259D中涉及的论文和讲义的扩展,建议阅读原始论文和讲义。☆72May 4, 2018Updated 7 years ago
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- Statitical Anomaly Detector of Internet Traffic (SADIT)☆22Mar 11, 2017Updated 8 years ago
- Intrusion Detection Based on Convolutional Neural Network with kdd99 data set☆57May 15, 2019Updated 6 years ago
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆27Jul 29, 2021Updated 4 years ago
- Corpus of auto-labeled text for the cyber security domain☆97Nov 27, 2019Updated 6 years ago
- This repository includes code for the paper "Towards Autonomous Cybersecurity: An Intelligent AutoML Framework for Autonomous Intrusion D…☆34Nov 8, 2024Updated last year
- Machine Learning for Cyber Security☆8,104Aug 19, 2024Updated last year
- Using PyTorch to train kddcup99 dataset with convolutional neural networks.☆54Apr 9, 2019Updated 6 years ago